2023
DOI: 10.36227/techrxiv.21953189.v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Why Smart Contracts Reported as Vulnerable were not Exploited?

Abstract: <p>As smart contracts process digital assets, their security is essential for blockchain applications. Many approaches have been proposed to detect smart contract vulnerabilities. Studies show that few of the reported vulnerabilities are exploited and hypothesize that many of the reported vulnerabilities are false positives. However, no follow-up study is performed to confirm the hypothesis and understand why the reported vulnerabilities are not exploited. In this study, we first collect 136,969 unique r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
12
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(12 citation statements)
references
References 28 publications
0
12
0
Order By: Relevance
“…Most of them focus on identifying vulnerabilities without distinguishing whether the vulnerabilities are exploitable. 14 F I G U R E 1 (A-C) The process by which an attacker exploits the vulnerabilities RE, UcC, and TO. Static detectors, for example, Oyente, 8 SmartCheck, 17 Slither, 24 Clairvoyance, 18 SoliDetector, 25 mainly compare the target SC with the vulnerable code pattern at the source code level.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Most of them focus on identifying vulnerabilities without distinguishing whether the vulnerabilities are exploitable. 14 F I G U R E 1 (A-C) The process by which an attacker exploits the vulnerabilities RE, UcC, and TO. Static detectors, for example, Oyente, 8 SmartCheck, 17 Slither, 24 Clairvoyance, 18 SoliDetector, 25 mainly compare the target SC with the vulnerable code pattern at the source code level.…”
Section: Related Workmentioning
confidence: 99%
“…The categories of unexploitable vulnerabilities are explained below, which are based on the reasons for not being able to exploit SC vulnerabilities concluded from an empirical study. 14 • CO. Critical operations include transfer, state variable change, and return value that may affect contract execution. If the reported vulnerability does not involve critical operations, the vulnerability cannot cause any harm and is, therefore, unexploitable.…”
Section: Experiments Setupmentioning
confidence: 99%
See 3 more Smart Citations